phrackzine / crackmeLinks
Phrack Crackme Challenges
☆17Updated 3 months ago
Alternatives and similar repositories for crackme
Users that are interested in crackme are comparing it to the libraries listed below
Sorting:
- Rust-based password mutator for brute force attacks☆13Updated 4 months ago
- Signing-key abuse and update exploitation framework☆130Updated 2 months ago
- Secure Rust Code☆16Updated 8 months ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆99Updated 2 years ago
- UAC Bypass using CMSTP in Rust☆29Updated 8 months ago
- ☆12Updated 2 years ago
- ☆23Updated 11 months ago
- ☆59Updated 3 weeks ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Persistence techniques for windows.☆19Updated 2 years ago
- Open Source eBPF Malware Analysis Framework☆49Updated 9 months ago
- Self-modifying malware in Rust☆28Updated 2 years ago
- Yet Another Simple Hypervisor☆10Updated 3 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 3 years ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆121Updated 6 months ago
- A rust library that allows you to delete your executable while it's running.☆89Updated 2 years ago
- RedLizard Rust TCP Reverse Shell Server/Client☆138Updated last year
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆28Updated last year
- Rust crate to simplify Windows ACL operations☆19Updated 2 years ago
- Sanitize documents to safe PDFs, for active content removal☆40Updated this week
- Keep it secret, keep it safe☆76Updated 6 months ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆10Updated 3 years ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- io_uring based network scanner written in Rust☆44Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- some AV / EDR / analysis studies☆11Updated 2 years ago
- ☆134Updated last year
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆36Updated last month
- 🥸 Experimental p2p gossip network for OpenPGP signature transparency 🥸☆35Updated 2 months ago